Skip to main content

Real Time Operating Systems

 

 

17IT90 - REAL TIME OPERATING SYSTEMS

(Add on course – I)
Pre-requisites:   Operating Systems, Computer Organization & Architecture.

Course Outcomes:

 CO1: Summarize the Components of Real Time Systems and their programming.

CO2: Differentiate the Static and Dynamic memory allocation strategies.

CO3: Apply Synchronization techniques forResource management in Real Time Systems.

CO4: Analyze deadlock management techniques and communication in distributed systems.

CO5: Illustrate file management and data management techniques.

 UNIT – I:

Introduction To Real-Time Systems: What is a real-time system? Case study: anti-lock braking system, Components of real-time systems, the history of real-time programming.

Real-time, embedded and operating-system programming: Programming languages, The C programming language, Software engineering and development, Summary of real-time programming.

Basics of RTOS PPT

Click Here for UNIT-I PPT

UNIT-I Objective Questions - Click Here

UNIT-I Descriptive Questions - Click Here

UNIT-I Assignment Questions - Click Here

 UNIT – II:

Static memory allocation: The requirements of a function, The Cortex-M3 design, set jump and long jump, Summary of static memory allocation.

Dynamic memory allocation: Abstract dynamic memory allocator, Allocation strategies, Case study: Free RTOS, Other features: clearing and Summary of dynamic memory allocation.

Click Here for UNIT-II PPT

UNIT-II Objective Questions - Click here


UNIT-II Descriptive Questions - Click here

UNIT-II Assignment Questions - Click Here

UNIT – III:

Synchronization: The need for synchronization, Petri nets—describing synchronizations graphically, Synchronization through token passing, Test-and-reset—a crude signal with polling, Semaphores—a better signal without polling, Problems in synchronization , Automatic synchronization, Summary of synchronization.

Resource management: Semaphores, Classification of resources, Device management, Resource managers, Priority and deadline inversion, Summary of resource management.

Click Here for UNIT-III PPT

UNIT-III Objective Questions - Click here


UNIT-III Descriptive Questions - Click here

UNIT-III Assignment Questions - Click Here

UNIT - IV:

Deadlock: Requirements for deadlock, Deadlock modelling, Techniques for preventing deadlock during the design, Deadlock detection and recovery, Deadlock avoidance.

Communication and distributed systems: Classification of communications, Solutions for communication, Priorities of messages, Synchronization, Coordination through election algorithms, when a message is sent over Network communications.

Click Here for UNIT-IV PPT

UNIT-IV Objective Questions - Click here


UNIT-IV Descriptive Questions - Click here

UNIT-IV Assignment Questions - Click Here

UNIT - V:

File management: Block addressable, Files, Organization, File systems, Data formats, the file abstraction, Keil RTX RTOS.

Data management: Linear data structures, Hash tables, Graphs, Non-relational databases, Relational databases.

Click Here for UNIT-V PPT

UNIT-V Objective Questions - Click here


UNIT-V Descriptive Questions - Click here

UNIT-V Assignment Questions - Click Here

TEXTBOOKS:

Douglas Wilhelm Harder, Jeff Zarnett, Vajih Montaghami and Allyson Giannikouris  - 

A practical introduction to real-time systems for undergraduate engineering

 

REFERENCES:

Realtime Operating Systems - Concepts and Implementation of Microkernels for Embedded Systems - Dr. Jürgen Sauermann, Melanie Thelen.


 


Comments

  1. Great Blog Sir... Thanks for sharing. You know very well, Skill is more important in life, If you have then you have the chance of great opportunity in your skill basis. If you don't have then would have struggled in your job or business. Now a day, You can build your skill in hardware repairing for your bright future. So, You can go for these courses at affordable prices.
    👉 Mobile Repairing Course
    👉 Laptop Repairing Course
    👉 CCTV Camera Repairing Course
    👉 Printer Repairing Course
    👉 AC Repairing Course
    👉 Smart TV Repairing Course
    👉 E Vehicle Repairing Course

    ReplyDelete
  2. Very good points you wrote here..Great stuff...I think you've made some truly interesting points.Keep up the good work. Network Security Test

    ReplyDelete

Post a Comment

Popular posts from this blog

S175 - CRYPTOGRAPHY AND NETWORK SECURITY

S175 - CRYPTOGRAPHY AND NETWORK SECURITY Course Educational Objectives: The main goal of this course is to provide you with a background, foundation, and insight into the many dimensions of information security. This knowledge will serve as basis for further deeper study into selected areas of the field, or as an important component in your further studies and involvement in computing as a whole. The primary objectives of the course are to help you: 1. Understand information security’s importance in our increasingly computer-driven world. 2. Master the key concepts of information security and how they “work.” 3. Develop a “security mindset:” learn how to critically analyze situations of computer and network usage from a security perspective, identifying the salient issues, viewpoints, and trade-offs. 4. Clearly and coherently communicate (both verbally and in writing) about complex technical topics. Course Outcomes: After completion of the course students are able to:

Business Intelligence and Big Data

S152 - BUSINESS INTELLIGENCE AND BIG DATA   COURSE EDUCATIONAL OBJECTIVES: The course covers Big Data Fundamentals, including the characteristics of Big Data, the sources Big Data (such as social media, sensor data, and geospatial data), as well as the challenges imposed around information management, data analytics, privacy and security, as well as platforms and architectures. Emphasis will be given to non-relational databases by examining techniques for storing and processing large volumes of structured and unstructured data, streaming data as well as complex analytics on them. Data warehouses will also be presented as a solution to handling big data and business intelligence applications. Business Intelligence (BI) systems in terms of its tools, current practices and impacts .The students should acquire knowledge on how to design BI solutions for different BI targets and users. COURSE OUTCOMES: At the end of this course, you should be able to: CO1: Outline basic concept

Data Mining and Data Warehousing

Data Mining and Data Warehousing Pre-Requisite:  Database Management Systems COURSE EDUCATIONAL OBJECTIVES (CEOs) :  Students will be enabled to understand and implement classical models and algorithms in data warehousing and data mining. They will learn how to analyze the data, identify the problems, and choose the relevant models and algorithms to apply. COURSE OUTCOMES (COs):  At the end of the course, students are able to CO 1 Understand the basic concepts of data warehouse & data mining. CO 2 Apply data pre-processing, generalization and data characterization techniques to provide suitable input for a range of data mining algorithms. CO 3 Analyze and provide solutions for real world problems using mining association techniques. CO 4 Examine the different classification & clustering techniques in data mining. CO 5 Apply data mining techniques to complex data objects like spatial data, multimedia data and web mining. TEXT BOO